Skip to main content

Change Tracking

Every modification to a CMDB record is logged with the user, timestamp, and action taken. This audit trail supports ITIL change management, compliance requirements, and forensic investigation.

What Gets Logged

CMDB tracks changes across all record types:

Record TypeTracked Actions
Configuration ItemsCreated, updated (any field change), deleted
PasswordsCreated, updated, deleted, viewed, checked out, checked in, revealed via RMM, rotated
DocumentsCreated, updated (each version increment), deleted
Flexible AssetsCreated, updated, deleted
Knowledge BaseCreated, published, archived, deleted
RelationshipsCreated, deleted
DiscoveryConfiguration changed, sync triggered, CIs created from discovery
NetworkSubnets/IPs/VLANs created, updated, deleted

Audit Log Fields

Each audit entry captures:

FieldDescription
UserWho made the change (user ID and display name)
ActionWhat operation was performed
TimestampWhen the change occurred
IP AddressSource IP of the request
RMM ContextDevice ID if the action originated from an RMM session
Record TypeWhat kind of record was changed
Record IDWhich specific record was changed

Audit records are retained for 365 days.

Viewing Change History

Per-CI History

  1. Open a CI's detail page
  2. Scroll to the Change History section
  3. View a chronological log of all modifications

Per-Password Audit

  1. Open a password record
  2. View the Audit Trail showing every access, checkout, and reveal

Global Audit

All CMDB operations are logged via the standard audit system, accessible through the Hub audit log for organization-wide visibility.

Bus Events

CMDB emits events on significant changes that other products can consume:

EventTrigger
cmdb.config.createdNew CI created
cmdb.config.updatedCI modified
cmdb.password.accessedPassword viewed or revealed
cmdb.password.anomalyUnusual password access pattern
cmdb.asset.discoveredNew device found via discovery
cmdb.document.staleDocument flagged as stale (not updated in 180+ days)

These events can trigger automation in PSA (e.g., auto-create a change ticket when a critical CI is modified) or Defend (e.g., investigate anomalous password access).

ℹ️

Change tracking is automatic and cannot be disabled. All CRUD operations are logged regardless of how they were initiated — UI, API, integration, or auto-discovery.

ITIL Change Management

To align CMDB change tracking with ITIL practices:

  1. Before making changes to critical CIs, create a change ticket in PSA
  2. Reference the PSA ticket number in the CI's description when making the change
  3. After the change, the CMDB audit log provides evidence that the change was executed as documented
  4. Use the audit trail during post-implementation reviews

Next Steps